Power management systems are the backbone of business continuity. But what happens when the very software designed to protect uptime becomes a security risk?
Eaton has issued a critical security advisory (ETN-VA-2025-1026) revealing two high-severity vulnerabilities in its UPS Companion software, widely used to manage uninterruptible power supply (UPS) systems across enterprises. These flaws could allow attackers to execute arbitrary code, potentially compromising critical infrastructure.
In this article, we’ll break down the vulnerabilities, their impact, and actionable steps to secure your environment.
What Happened? Eaton’s Security Advisory Explained
Eaton disclosed two vulnerabilities affecting its UPS Companion and IPP software installers:
| CVE ID | CVSS Score | Severity | Type |
|---|---|---|---|
| CVE-2025-59887 | 8.6 | High | Insecure Library Loading |
| CVE-2025-59888 | 6.7 | Medium | Improper Quotation |
CVE-2025-59887 – Insecure Library Loading (CVSS 8.6)
This critical flaw impacts the Eaton IPP software installer. Attackers who gain access to the software package can exploit insecure library loading to execute arbitrary code on the host system.
- Attack Complexity: Low
- Impact: Confidentiality, Integrity, Availability
- Vector: Local (requires access to the system)
CVE-2025-59888 – Improper Quotation (CVSS 6.7)
This vulnerability affects UPS Companion software due to improper quoting in search paths. Attackers with file-system access could exploit this to run malicious code, though high-level privileges are typically required.
Affected Versions
- All versions of Eaton UPS Companion before 3.0 are vulnerable.
- Eaton strongly recommends upgrading to version 3.0 immediately.
Why These Flaws Matter
UPS systems are critical for data centers, hospitals, manufacturing plants, and enterprise IT environments. Exploiting these vulnerabilities could lead to:
- System compromise: Attackers gain control over power management systems.
- Operational disruption: Potential downtime for critical services.
- Supply chain risk: Malicious installers from unofficial sources.
Given the low complexity of CVE-2025-59887, attackers with minimal access could cause significant damage.
Recommended Mitigation Steps
Eaton advises customers to apply patches immediately and follow these best practices:
Immediate Actions
- Upgrade to UPS Companion v3.0 from Eaton’s official site.
- Verify installer integrity using checksums provided by Eaton.
Protective Measures for Delayed Patching
- Restrict access to host systems to authorized personnel only.
- Implement secure firewalls around control system networks.
- Source software exclusively from official Eaton channels.
- Deploy control systems behind barrier devices.
- Isolate UPS systems from business networks to minimize exposure.
Additional Security Hardening
- Change default passwords.
- Enable audit logs for monitoring.
- Disable unused services.
- Conduct regular security assessments.
Compliance & Risk Considerations
Organizations in regulated sectors (finance, healthcare, energy) should map these vulnerabilities to compliance frameworks:
- NIST SP 800-53: RA-5 (Vulnerability Scanning), SI-2 (Flaw Remediation)
- ISO/IEC 27001: Annex A.12 (Operations Security)
- NIS2 Directive: Operational resilience for critical infrastructure
Failure to patch could expose organizations to regulatory penalties and operational risk.
Best Practices for UPS Security
- Maintain asset inventory for all power management systems.
- Integrate UPS systems into vulnerability management programs.
- Apply Zero Trust principles to OT/ICS environments.
- Regularly review vendor advisories and subscribe to security alerts.
FAQs
Q1. Which Eaton products are affected?
UPS Companion software (all versions before 3.0) and IPP installer are impacted.
Q2. How critical is CVE-2025-59887?
It scores 8.6 (High) on CVSS, allowing arbitrary code execution with low complexity.
Q3. Can these flaws be exploited remotely?
No, both vulnerabilities require local access to the system.
Q4. What’s the quickest fix?
Upgrade to UPS Companion v3.0 immediately from Eaton’s official site.
Q5. What if patching is delayed?
Restrict access, isolate systems, enable audit logs, and source software only from official channels.
Conclusion
Power management systems are often overlooked in cybersecurity programs—but they’re critical to operational resilience. Eaton’s advisory underscores the importance of timely patching, secure configurations, and continuous monitoring.
Action now: Upgrade to UPS Companion v3.0, implement Eaton’s recommended controls, and review your OT security posture against NIST, ISO, and NIS2 requirements.